Skip to main content

Showing 1–50 of 140 results for author: Amat, A G i

Searching in archive cs. Search in all archives.
.
  1. arXiv:2406.12955  [pdf, ps, other

    cs.IT

    An End-to-End Coding Scheme for DNA-Based Data Storage With Nanopore-Sequenced Reads

    Authors: Lorenz Welter, Roman Sokolovskii, Thomas Heinis, Antonia Wachter-Zeh, Eirik Rosnes, Alexandre Graell i Amat

    Abstract: We consider error-correcting coding for deoxyribonucleic acid (DNA)-based storage using nanopore sequencing. We model the DNA storage channel as a sampling noise channel where the input data is chunked into $M$ short DNA strands, which are copied a random number of times, and the channel outputs a random selection of $N$ noisy DNA strands. The retrieved DNA reads are prone to strand-dependent inse… ▽ More

    Submitted 18 June, 2024; originally announced June 2024.

  2. arXiv:2405.07596  [pdf, ps, other

    cs.IT

    Local Mutual-Information Differential Privacy

    Authors: Khac-Hoang Ngo, Johan Östman, Alexandre Graell i Amat

    Abstract: Local mutual-information differential privacy (LMIDP) is a privacy notion that aims to quantify the reduction of uncertainty about the input data when the output of a privacy-preserving mechanism is revealed. We study the relation of LMIDP with local differential privacy (LDP), the de facto standard notion of privacy in context-independent (CI) scenarios, and with local information privacy (LIP),… ▽ More

    Submitted 13 May, 2024; originally announced May 2024.

    Comments: submitted to the IEEE Information Theory Workshop (ITW) 2024

  3. arXiv:2404.18990  [pdf, ps, other

    cs.IT eess.SP

    Timely Status Updates in Slotted ALOHA Networks With Energy Harvesting

    Authors: Khac-Hoang Ngo, Giuseppe Durisi, Andrea Munari, Francisco Lázaro, Alexandre Graell i Amat

    Abstract: We investigate the age of information (AoI) in a scenario where energy-harvesting devices send status updates to a gateway following the slotted ALOHA protocol and receive no feedback. We let the devices adjust the transmission probabilities based on their current battery level. Using a Markovian analysis, we derive analytically the average AoI. We further provide an approximate analysis for accur… ▽ More

    Submitted 11 May, 2024; v1 submitted 29 April, 2024; originally announced April 2024.

    Comments: Submitted to IEEE Transaction of Communications. A short version [arXiv:[2310.00348] was presented at GLOBECOM 2023. Simulation code: https://github.com/khachoang1412/AoI_slottedALOHA_energyHarvesting. arXiv admin note: text overlap with arXiv:2310.00348

  4. Low-Density Parity-Check Codes and Spatial Coupling for Quantitative Group Testing

    Authors: Mgeni Makambi Mashauri, Alexandre Graell i Amat, Michael Lentmaier

    Abstract: A non-adaptive quantitative group testing (GT) scheme based on sparse codes-on-graphs in combination with low-complexity peeling decoding was introduced and analyzed by Karimi et al.. In this work, we propose a variant of this scheme based on low-density parity-check codes where the BCH codes at the constraint nodes are replaced by simple single parity-check codes. Furthermore, we apply spatial co… ▽ More

    Submitted 17 April, 2024; originally announced April 2024.

    Journal ref: IEEE International Symposium on Information Theory (ISIT), Taipei, Taiwan, 2023, pp. 1860-1865

  5. Robust Performance Over Changing Intersymbol Interference Channels by Spatial Coupling

    Authors: Mgeni Makambi Mashauri, Alexandre Graell i Amat, Michael Lentmaier

    Abstract: We show that spatially coupled low-density parity-check (LDPC) codes yield robust performance over changing intersymbol interfere (ISI) channels with optimal and suboptimal detectors. We compare the performance with classical LDPC code design which involves optimizing the degree distribution for a given (known) channel. We demonstrate that these classical schemes, despite working very good when de… ▽ More

    Submitted 16 April, 2024; originally announced April 2024.

    Journal ref: ICC 2022 - IEEE International Conference on Communications, Seoul, Korea, Republic of, 2022, pp. 2924-2929

  6. On the Universality of Spatially Coupled LDPC Codes Over Intersymbol Interference Channels

    Authors: Mgeni Makambi Mashauri, Alexandre Graell i Amat, Michael Lentmaier

    Abstract: In this paper, we derive the exact input/output transfer functions of the optimal a-posteriori probability channel detector for a general ISI channel with erasures. Considering three channel impulse responses of different memory as an example, we compute the BP and MAP thresholds for regular spatially coupled LDPC codes with joint iterative detection and decoding. When we compare the results with… ▽ More

    Submitted 16 April, 2024; originally announced April 2024.

    Journal ref: 2021 IEEE Information Theory Workshop (ITW), Kanazawa, Japan, 2021, pp.1-6

  7. arXiv:2403.17775  [pdf, ps, other

    cs.LG cs.CR

    Secure Aggregation is Not Private Against Membership Inference Attacks

    Authors: Khac-Hoang Ngo, Johan Östman, Giuseppe Durisi, Alexandre Graell i Amat

    Abstract: Secure aggregation (SecAgg) is a commonly-used privacy-enhancing mechanism in federated learning, affording the server access only to the aggregate of model updates while safeguarding the confidentiality of individual updates. Despite widespread claims regarding SecAgg's privacy-preserving capabilities, a formal analysis of its privacy is lacking, making such presumptions unjustified. In this pape… ▽ More

    Submitted 14 June, 2024; v1 submitted 26 March, 2024; originally announced March 2024.

    Comments: accepted to the European Conference on Machine Learning and Principles and Practice of Knowledge Discovery in Databases (ECML PKDD) 2024

  8. arXiv:2402.19163  [pdf, other

    cs.LG cs.IT

    Decoupled Subgraph Federated Learning

    Authors: Javad Aliakbari, Johan Östman, Alexandre Graell i Amat

    Abstract: We address the challenge of federated learning on graph-structured data distributed across multiple clients. Specifically, we focus on the prevalent scenario of interconnected subgraphs, where interconnections between different clients play a critical role. We present a novel framework for this scenario, named FedStruct, that harnesses deep structural dependencies. To uphold privacy, unlike existi… ▽ More

    Submitted 20 June, 2024; v1 submitted 29 February, 2024; originally announced February 2024.

    Comments: Updated version. Main changes: 1. Title; 2. Added discussion on communication complexity and a pruned version of our framework; 3. Focused on our general framework for the scenario where server lacks knowledge of global graph connections, and discussed the scenario with complete knowledge in Appendix; 4. Compared FedStruct with FedPub; 5. Included results using FedStar and for federated averaging

  9. arXiv:2312.10950  [pdf, other

    cs.IT quant-ph

    Belief Propagation Decoding of Quantum LDPC Codes with Guided Decimation

    Authors: Hanwen Yao, Waleed Abu Laban, Christian Häger, Alexandre Graell i Amat, Henry D. Pfister

    Abstract: Quantum low-density parity-check (QLDPC) codes have emerged as a promising technique for quantum error correction. A variety of decoders have been proposed for QLDPC codes and many of them utilize belief propagation (BP) decoding in some fashion. However, the use of BP decoding for degenerate QLDPC codes is known to have issues with convergence. These issues are typically attributed to short cycle… ▽ More

    Submitted 21 June, 2024; v1 submitted 18 December, 2023; originally announced December 2023.

    Comments: 19 pages, 8 figures

  10. arXiv:2310.00348  [pdf, other

    cs.IT

    Age of Information in Slotted ALOHA With Energy Harvesting

    Authors: Khac-Hoang Ngo, Giuseppe Durisi, Alexandre Graell i Amat, Andrea Munari, Francisco Lázaro

    Abstract: We examine the age of information (AoI) of a status update system that incorporates energy harvesting and uses the slotted ALOHA protocol. We derive analytically the average AoI and the probability that the AoI exceeds a given threshold. Via numerical results, we investigate two strategies to minimize the age of information (AoI): transmitting a new update whenever possible to exploit every chance… ▽ More

    Submitted 30 September, 2023; originally announced October 2023.

    Comments: Accepted to IEEE Globecom 2023; simulation code: https://github.com/khachoang1412/AoI_slottedALOHA_energyHarvesting

  11. arXiv:2308.08326  [pdf, ps, other

    cs.IT

    Soft-Information Post-Processing for Chase-Pyndiah Decoding Based on Generalized Mutual Information

    Authors: Andreas Straßhofer, Diego Lentner, Gianluigi Liva, Alexandre Graell i Amat

    Abstract: Chase-Pyndiah decoding is widely used for decoding product codes. However, this method is suboptimal and requires scaling the soft information exchanged during the iterative processing. In this paper, we propose a framework for obtaining the scaling coefficients based on maximizing the generalized mutual information. Our approach yields gains up to 0.11 dB for product codes with two-error correcti… ▽ More

    Submitted 16 August, 2023; originally announced August 2023.

    Comments: 5 pages, 2 figures, to be presented at ISTC 2023

  12. arXiv:2305.05506  [pdf, other

    cs.LG cs.CR cs.IT

    FedGT: Identification of Malicious Clients in Federated Learning with Secure Aggregation

    Authors: Marvin Xhemrishi, Johan Östman, Antonia Wachter-Zeh, Alexandre Graell i Amat

    Abstract: We propose FedGT, a novel framework for identifying malicious clients in federated learning with secure aggregation. Inspired by group testing, the framework leverages overlap** groups of clients to identify the presence of malicious clients in the groups via a decoding operation. The clients identified as malicious are then removed from the training of the model, which is performed over the rem… ▽ More

    Submitted 10 October, 2023; v1 submitted 9 May, 2023; originally announced May 2023.

    Comments: 27 pages, 13 figures

  13. arXiv:2302.11720  [pdf, ps, other

    cs.IT

    Irregular Repetition Slotted ALOHA Over the Binary Adder Channel

    Authors: Khac-Hoang Ngo, Alexandre Graell i Amat, Giuseppe Durisi

    Abstract: We propose an irregular repetition slotted ALOHA (IRSA) based random-access protocol for the binary adder channel (BAC). The BAC captures important physical-layer concepts, such as packet generation, per-slot decoding, and information rate, which are neglected in the commonly considered collision channel model. We divide a frame into slots and let users generate a packet, to be transmitted over a… ▽ More

    Submitted 22 February, 2023; originally announced February 2023.

    Comments: accepted to IEEE International Conference on Communication (ICC) 2023

  14. arXiv:2302.11026  [pdf, other

    cs.IT

    Unsourced Multiple Access with Common Alarm Messages: Network Slicing for Massive and Critical IoT

    Authors: Khac-Hoang Ngo, Giuseppe Durisi, Alexandre Graell i Amat, Petar Popovski, Anders E. Kalor, Beatriz Soret

    Abstract: We investigate the coexistence of massive and critical Internet of Things (IoT) services in the context of the unsourced multiple access (UMA) framework introduced by Polyanskiy (2017), where all users employ a common codebook and the receiver returns an unordered list of decoded codewords. This setup is suitably modified to introduce heterogeneous traffic. Specifically, to model the massive IoT s… ▽ More

    Submitted 13 October, 2023; v1 submitted 21 February, 2023; originally announced February 2023.

    Comments: IEEE Transactions on Communications

  15. arXiv:2301.12231  [pdf, other

    cs.IT cs.LG eess.SP

    Rateless Autoencoder Codes: Trading off Decoding Delay and Reliability

    Authors: Vukan Ninkovic, Dejan Vukobratovic, Christian Häger, Henk Wymeersch, Alexandre Graell i Amat

    Abstract: Most of today's communication systems are designed to target reliable message recovery after receiving the entire encoded message (codeword). However, in many practical scenarios, the transmission process may be interrupted before receiving the complete codeword. This paper proposes a novel rateless autoencoder (AE)-based code design suitable for decoding the transmitted message before the noisy c… ▽ More

    Submitted 31 January, 2023; v1 submitted 28 January, 2023; originally announced January 2023.

    Comments: 6 pages, 7 figures, to appear at IEEE ICC 2023

  16. arXiv:2212.10402  [pdf, ps, other

    cs.IT

    Index-Based Concatenated Codes for the Multi-Draw DNA Storage Channel

    Authors: Lorenz Welter, Issam Maarouf, Andreas Lenz, Antonia Wachter-Zeh, Eirik Rosnes, Alexandre Graell i Amat

    Abstract: We consider error-correcting coding for DNA-based storage. We model the DNA storage channel as a multi-draw IDS channel where the input data is chunked into $M$ short DNA strands, which are copied a random number of times, and the channel outputs a random selection of $N$ noisy DNA strands. The retrieved DNA strands are prone to insertion, deletion, and substitution (IDS) errors. We propose an ind… ▽ More

    Submitted 21 June, 2023; v1 submitted 20 December, 2022; originally announced December 2022.

    Comments: accepted to IEEE Information Theory Workshop (ITW) 2023

  17. arXiv:2212.09303  [pdf, ps, other

    cs.IT

    Finite Blocklength Performance Bound for the DNA Storage Channel

    Authors: Issam Maarouf, Gianluigi Liva, Eirik Rosnes, Alexandre Graell i Amat

    Abstract: We present a finite blocklength performance bound for a DNA storage channel with insertions, deletions, and substitutions. The considered bound -- the dependency testing (DT) bound, introduced by Polyanskiy et al. in 2010 -- provides an upper bound on the achievable frame error probability and can be used to benchmark coding schemes in the practical short-to-medium blocklength regime. In particula… ▽ More

    Submitted 4 August, 2023; v1 submitted 19 December, 2022; originally announced December 2022.

    Comments: To appear in the proceedings the 12th International Symposium on Topics in Coding (ISTC), Brest, France, September 2023

  18. arXiv:2212.07287  [pdf, other

    cs.IT

    Achievable Information Rates and Concatenated Codes for the DNA Nanopore Sequencing Channel

    Authors: Issam Maarouf, Eirik Rosnes, Alexandre Graell i Amat

    Abstract: The errors occurring in DNA-based storage are correlated in nature, which is a direct consequence of the synthesis and sequencing processes. In this paper, we consider the memory-$k$ nanopore channel model recently introduced by Hamoum et al., which models the inherent memory of the channel. We derive the maximum a posteriori (MAP) decoder for this channel model. The derived MAP decoder allows us… ▽ More

    Submitted 24 March, 2023; v1 submitted 14 December, 2022; originally announced December 2022.

    Comments: This paper has been accepted and awaiting publication in informatio theory workshop (ITW) 2023

  19. arXiv:2211.17056  [pdf, other

    cs.IT

    Improving the Thresholds of Generalized LDPC Codes with Convolutional Code Constraints

    Authors: Muhammad Umar Farooq, Michael Lentmaier, Alexandre Graell i Amat

    Abstract: CC-GLPDC codes are a class of generalized low-density parity-check (GLDPC) codes where the constraint nodes (CNs) represent convolutional codes. This allows for efficient decoding in the trellis with the forward-backward algorithm, and the strength of the component codes easily can be controlled by the encoder memory without changing the graph structure. In this letter, we extend the class of CC-G… ▽ More

    Submitted 30 November, 2022; originally announced November 2022.

    Comments: Submitted to IEEE communication letters

  20. arXiv:2203.08880  [pdf, other

    cs.IT

    Finite-Length Scaling of SC-LDPC Codes With a Limited Number of Decoding Iterations

    Authors: Roman Sokolovskii, Alexandre Graell i Amat, Fredrik Brännström

    Abstract: We propose four finite-length scaling laws to predict the frame error rate (FER) performance of spatially-coupled low-density parity-check codes under full belief propagation (BP) decoding with a limit on the number of decoding iterations and a scaling law for sliding window decoding, also with limited iterations. The laws for full BP decoding provide a choice between accuracy and computational co… ▽ More

    Submitted 16 March, 2022; originally announced March 2022.

  21. arXiv:2202.13798  [pdf, ps, other

    cs.IT cs.CR cs.DC

    Computational Code-Based Privacy in Coded Federated Learning

    Authors: Marvin Xhemrishi, Alexandre Graell i Amat, Eirik Rosnes, Antonia Wachter-Zeh

    Abstract: We propose a privacy-preserving federated learning (FL) scheme that is resilient against straggling devices. An adaptive scenario is suggested where the slower devices share their data with the faster ones and do not participate in the learning process. The proposed scheme employs code-based cryptography to ensure \emph{computational} privacy of the private data, i.e., no device with bounded compu… ▽ More

    Submitted 28 February, 2022; originally announced February 2022.

    Comments: 7 pages, 1 figure, submitted for review to ISIT 2022

  22. arXiv:2202.07908  [pdf, other

    cs.IT

    Error Floor Analysis of Irregular Repetition ALOHA

    Authors: Federico Clazzer, Alexandre Graell i Amat

    Abstract: With the rapid expansion of the Internet of Things, the efficient sharing of the wireless medium by a large amount of simple transmitters is becoming essential. Scheduling-based solutions are inefficient for this setting, where small data units are broadcast sporadically by terminals that most of the time are idle. Modern random access has embraced the challenge and provides suitable slot-synchron… ▽ More

    Submitted 17 February, 2022; v1 submitted 16 February, 2022; originally announced February 2022.

    Comments: v2: updated formatting. Accepted for publication at IEEE ICC 2022, Communication Theory symposium

  23. arXiv:2202.06365  [pdf, ps, other

    cs.IT

    Unsourced Multiple Access With Random User Activity

    Authors: Khac-Hoang Ngo, Alejandro Lancho, Giuseppe Durisi, Alexandre Graell i Amat

    Abstract: To account for the massive uncoordinated random access scenario, which is relevant for the Internet of Things, Polyanskiy (2017) proposed a novel formulation of the multiple-access problem, commonly referred to as unsourced multiple access, where all users employ a common codebook and the receiver decodes up to a permutation of the messages. We extend this seminal work to the case where the number… ▽ More

    Submitted 22 February, 2023; v1 submitted 13 February, 2022; originally announced February 2022.

    Comments: accepted to IEEE Transactions on Information Theory; simulation code available at: https://github.com/khachoang1412/UMA_random_user_activity. arXiv admin note: text overlap with arXiv:2103.09721

  24. arXiv:2201.09414  [pdf, other

    cs.IT eess.SP

    Generalized Spatially-Coupled Parallel Concatenated Codes With Partial Repetition

    Authors: Min Qiu, Xiaowei Wu, **hong Yuan, Alexandre Graell i Amat

    Abstract: A new class of spatially-coupled turbo-like codes (SC-TCs), dubbed generalized spatially coupled parallel concatenated codes (GSC-PCCs), is introduced. These codes are constructed by applying spatial coupling on parallel concatenated codes (PCCs) with a fraction of information bits repeated $q$ times. GSC-PCCs can be seen as a generalization of the original spatially-coupled parallel concatenated… ▽ More

    Submitted 24 February, 2022; v1 submitted 23 January, 2022; originally announced January 2022.

    Comments: Revised version, 36 pages, 10 figures, 4 tables. arXiv admin note: text overlap with arXiv:2105.00698

  25. arXiv:2112.08909  [pdf, other

    cs.LG cs.CR cs.IT

    CodedPaddedFL and CodedSecAgg: Straggler Mitigation and Secure Aggregation in Federated Learning

    Authors: Reent Schlegel, Siddhartha Kumar, Eirik Rosnes, Alexandre Graell i Amat

    Abstract: We present two novel federated learning (FL) schemes that mitigate the effect of straggling devices by introducing redundancy on the devices' data across the network. Compared to other schemes in the literature, which deal with stragglers or device dropouts by ignoring their contribution, the proposed schemes do not suffer from the client drift problem. The first scheme, CodedPaddedFL, mitigates t… ▽ More

    Submitted 3 June, 2022; v1 submitted 16 December, 2021; originally announced December 2021.

    Comments: 14 pages, 7 figures, this work has been submitted to the IEEE for possible publication

  26. arXiv:2112.01182  [pdf, ps, other

    cs.IT

    Age of Information in Prioritized Random Access

    Authors: Khac-Hoang Ngo, Giuseppe Durisi, Alexandre Graell i Amat

    Abstract: Age of information (AoI) is a performance metric that captures the freshness of status updates. While AoI has been studied thoroughly for point-to-point links, the impact of modern random-access protocols on this metric is still unclear. In this paper, we extend the recent results by Munari to prioritized random access where devices are divided into different classes according to different AoI req… ▽ More

    Submitted 2 December, 2021; originally announced December 2021.

    Comments: 6 pages, 3 figures, presented in Asilomar 2021

  27. arXiv:2111.14452  [pdf, ps, other

    cs.IT

    Concatenated Codes for Multiple Reads of a DNA Sequence

    Authors: Issam Maarouf, Andreas Lenz, Lorenz Welter, Antonia Wachter-Zeh, Eirik Rosnes, Alexandre Graell i Amat

    Abstract: Decoding sequences that stem from multiple transmissions of a codeword over an insertion, deletion, and substitution channel is a critical component of efficient deoxyribonucleic acid (DNA) data storage systems. In this paper, we consider a concatenated coding scheme with an outer nonbinary low-density parity-check code or a polar code and either an inner convolutional code or a time-varying block… ▽ More

    Submitted 12 September, 2022; v1 submitted 29 November, 2021; originally announced November 2021.

    Comments: This paper has been accepted for publication in the IEEE Transactions on Information Theory

  28. arXiv:2111.13877  [pdf, other

    cs.DC

    DSAG: A mixed synchronous-asynchronous iterative method for straggler-resilient learning

    Authors: Albin Severinson, Eirik Rosnes, Salim El Rouayheb, Alexandre Graell i Amat

    Abstract: We consider straggler-resilient learning. In many previous works, e.g., in the coded computing literature, straggling is modeled as random delays that are independent and identically distributed between workers. However, in many practical scenarios, a given worker may straggle over an extended period of time. We propose a latency model that captures this behavior and is substantiated by traces col… ▽ More

    Submitted 27 November, 2021; originally announced November 2021.

  29. arXiv:2110.03545  [pdf, other

    cs.IT

    Privacy-Preserving Coded Mobile Edge Computing for Low-Latency Distributed Inference

    Authors: Reent Schlegel, Siddhartha Kumar, Eirik Rosnes, Alexandre Graell i Amat

    Abstract: We consider a mobile edge computing scenario where a number of devices want to perform a linear inference $\boldsymbol{W}\boldsymbol{x}$ on some local data $\boldsymbol{x}$ given a network-side matrix $\boldsymbol{W}$. The computation is performed at the network edge over a number of edge servers. We propose a coding scheme that provides information-theoretic privacy against $z$ colluding (honest-… ▽ More

    Submitted 15 February, 2022; v1 submitted 7 October, 2021; originally announced October 2021.

    Comments: 12 pages, 6 figures, published in the Journal on Selected Areas in Communications

  30. arXiv:2109.15226  [pdf, other

    cs.LG cs.IT

    Coding for Straggler Mitigation in Federated Learning

    Authors: Siddhartha Kumar, Reent Schlegel, Eirik Rosnes, Alexandre Graell i Amat

    Abstract: We present a novel coded federated learning (FL) scheme for linear regression that mitigates the effect of straggling devices while retaining the privacy level of conventional FL. The proposed scheme combines one-time padding to preserve privacy and gradient codes to yield resiliency against stragglers and consists of two phases. In the first phase, the devices share a one-time padded version of t… ▽ More

    Submitted 15 February, 2022; v1 submitted 30 September, 2021; originally announced September 2021.

    Comments: 6 pages, 3 figures, published at the IEEE International Conference on Communications 2022

  31. arXiv:2108.07675  [pdf, other

    cs.IT

    Rateless Codes for Low-Latency Distributed Inference in Mobile Edge Computing

    Authors: Anton Frigård, Siddhartha Kumar, Eirik Rosnes, Alexandre Graell i Amat

    Abstract: We consider a mobile edge computing scenario where users want to perform a linear inference operation $\boldsymbol{W} \boldsymbol{x}$ on local data $\boldsymbol{x}$ for some network-side matrix $\boldsymbol{W}$. The inference is performed in a distributed fashion over multiple servers at the network edge. For this scenario, we propose a coding scheme that combines a rateless code to provide resili… ▽ More

    Submitted 17 August, 2021; originally announced August 2021.

  32. arXiv:2105.00698  [pdf, other

    cs.IT eess.SP

    Generalized Spatially Coupled Parallel Concatenated Convolutional Codes With Partial Repetition

    Authors: Min Qiu, Xiaowei Wu, **hong Yuan, Alexandre Graell i Amat

    Abstract: We introduce generalized spatially coupled parallel concatenated codes (GSC-PCCs), a class of spatially coupled turbo-like codes obtained by coupling parallel concatenated codes (PCCs) with a fraction of information bits repeated before the PCC encoding. GSC-PCCs can be seen as a generalization of the original spatially coupled parallel concatenated convolutional codes (SC-PCCs) proposed by Moloud… ▽ More

    Submitted 3 May, 2021; originally announced May 2021.

    Comments: 6 pages, 3 figures, accepted by the 2021 IEEE International Symposium on Information Theory

  33. On Doped SC-LDPC Codes for Streaming

    Authors: Roman Sokolovskii, Alexandre Graell i Amat, Fredrik Brännström

    Abstract: In streaming applications, do** improves the performance of spatially-coupled low-density parity-check (SC-LDPC) codes by creating reduced-degree check nodes in the coupled chain. We formulate a scaling law to predict the bit and block error rate of periodically-doped semi-infinite SC-LDPC code ensembles streamed over the binary erasure channel under sliding window decoding for a given finite co… ▽ More

    Submitted 22 April, 2021; originally announced April 2021.

    Comments: Published in IEEE Communications Letters (Early Access)

  34. arXiv:2104.08190  [pdf, other

    cs.IT

    Autoencoder-Based Unequal Error Protection Codes

    Authors: Vukan Ninkovic, Dejan Vukobratovic, Christian Häger, Henk Wymeersch, Alexandre Graell i Amat

    Abstract: We present a novel autoencoder-based approach for designing codes that provide unequal error protection (UEP) capabilities. The proposed design is based on a generalization of an autoencoder loss function that accommodates both message-wise and bit-wise UEP scenarios. In both scenarios, the generalized loss function can be adjusted using an associated weight vector to trade off error probabilities… ▽ More

    Submitted 16 April, 2021; originally announced April 2021.

    Comments: 5 pages, 6 figures, submitted for publication

  35. arXiv:2104.06724  [pdf, other

    cs.IT

    Dynamic Coded Caching in Wireless Networks Using Multi-Agent Reinforcement Learning

    Authors: Jesper Pedersen, Alexandre Graell i Amat, Fredrik Brännström, Eirik Rosnes

    Abstract: We consider distributed caching of content across several small base stations (SBSs) in a wireless network, where the content is encoded using a maximum distance separable code. Specifically, we apply soft time-to-live (STTL) cache management policies, where coded packets may be evicted from the caches at periodic times. We propose a reinforcement learning (RL) approach to find coded STTL policies… ▽ More

    Submitted 14 April, 2021; originally announced April 2021.

  36. arXiv:2103.09721  [pdf, ps, other

    cs.IT

    Massive Uncoordinated Access With Random User Activity

    Authors: Khac-Hoang Ngo, Alejandro Lancho, Giuseppe Durisi, Alexandre Graell i Amat

    Abstract: We extend the seminal work by Polyanskiy (2017) on massive uncoordinated access to the case where the number of active users is random and unknown a priori. We define a random-access code accounting for both misdetection (MD) and false alarm (FA), and derive a random-coding achievability bound for the Gaussian multiple-access channel. Our bound captures the fundamental trade-off between MD and FA… ▽ More

    Submitted 13 February, 2022; v1 submitted 17 March, 2021; originally announced March 2021.

    Comments: 12 pages, 3 figures; presented in IEEE International Symposium on Information Theory (ISIT) 2021; simulation code available at: https://github.com/khachoang1412/UMA_random_user_activity

  37. arXiv:2102.10639  [pdf, other

    cs.IT eess.SP

    Privacy-Preserving Wireless Federated Learning Exploiting Inherent Hardware Impairments

    Authors: Sina Rezaei Aghdam, Ehsan Amid, Marija Furdek, Alexandre Graell i Amat

    Abstract: We consider a wireless federated learning system where multiple data holder edge devices collaborate to train a global model via sharing their parameter updates with an honest-but-curious parameter server. We demonstrate that the inherent hardware-induced distortion perturbing the model updates of the edge devices can be exploited as a privacy-preserving mechanism. In particular, we model the dist… ▽ More

    Submitted 29 August, 2021; v1 submitted 21 February, 2021; originally announced February 2021.

    Comments: 6 pages, 2 figures, submitted to IEEE 26th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD2021) SS4: Physical-Layer Methods for Security and Privacy in Beyond 5G/6G and Internet of Things Networks

  38. arXiv:2012.13082  [pdf, other

    cs.IT eess.SP

    Analysis and Design of Partially Information- and Partially Parity-Coupled Turbo Codes

    Authors: Min Qiu, Xiaowei Wu, Alexandre Graell i Amat, **hong Yuan

    Abstract: In this paper, we study a class of spatially coupled turbo codes, namely partially information- and partially parity-coupled turbo codes. This class of codes enjoy several advantages such as flexible code rate adjustment by varying the coupling ratio and the encoding and decoding architectures of the underlying component codes can remain unchanged. For this work, we first provide the construction… ▽ More

    Submitted 23 December, 2020; originally announced December 2020.

    Comments: 15 pages, 13 figures. Accepted for publication in IEEE Transactions on Communications

  39. arXiv:2011.13594  [pdf, other

    cs.IT

    Pruning and Quantizing Neural Belief Propagation Decoders

    Authors: Andreas Buchberger, Christian Häger, Henry D. Pfister, Laurent Schmalen, Alexandre Graell i Amat

    Abstract: We consider near maximum-likelihood (ML) decoding of short linear block codes. In particular, we propose a novel decoding approach based on neural belief propagation (NBP) decoding recently introduced by Nachmani et al. in which we allow a different parity-check matrix in each iteration of the algorithm. The key idea is to consider NBP decoding over an overcomplete parity-check matrix and use the… ▽ More

    Submitted 27 November, 2020; originally announced November 2020.

    Comments: Accepted for publication in IEEE Journal on Selected Areas in Communications (J-SAC)

  40. arXiv:2011.02161  [pdf, other

    cs.IT

    Learned Decimation for Neural Belief Propagation Decoders

    Authors: Andreas Buchberger, Christian Häger, Henry D. Pfister, Laurent Schmalen, Alexandre Graell i Amat

    Abstract: We introduce a two-stage decimation process to improve the performance of neural belief propagation (NBP), recently introduced by Nachmani et al., for short low-density parity-check (LDPC) codes. In the first stage, we build a list by iterating between a conventional NBP decoder and guessing the least reliable bit. The second stage iterates between a conventional NBP decoder and learned decimation… ▽ More

    Submitted 4 November, 2020; originally announced November 2020.

  41. arXiv:2010.15461  [pdf, other

    cs.IT

    Concatenated Codes for Recovery From Multiple Reads of DNA Sequences

    Authors: Andreas Lenz, Issam Maarouf, Lorenz Welter, Antonia Wachter-Zeh, Eirik Rosnes, Alexandre Graell i Amat

    Abstract: Decoding sequences that stem from multiple transmissions of a codeword over an insertion, deletion, and substitution channel is a critical component of efficient deoxyribonucleic acid (DNA) data storage systems. In this paper, we consider a concatenated coding scheme with an outer low-density parity-check code and either an inner convolutional code or a block code. We propose two new decoding algo… ▽ More

    Submitted 29 October, 2020; originally announced October 2020.

    Comments: 5 pages, 6 figures

    MSC Class: 94B50; 94A05

  42. arXiv:2008.06938  [pdf, other

    cs.IT

    Successive Cancellation Decoding of Single Parity-Check Product Codes: Analysis and Improved Decoding

    Authors: Mustafa Cemil Coşkun, Gianluigi Liva, Alexandre Graell i Amat, Michael Lentmaier, Henry D. Pfister

    Abstract: A product code with single parity-check component codes can be described via the tools of a multi-kernel polar code, where the rows of the generator matrix are chosen according to the constraints imposed by the product code construction. Following this observation, successive cancellation decoding of such codes is introduced. In particular, the error probability of single parity-check product code… ▽ More

    Submitted 25 July, 2021; v1 submitted 16 August, 2020; originally announced August 2020.

    Comments: Submitted to the IEEE Transactions on Information Theory. The revised version of the first submission. Major changes: 1) No dedicated section for numerical results. Instead, simulations are provided right after the relevant section. 2) More simulation results are added, including those for the BEC. Comparisons to the state-of-art polar codes and 5G-NR LDPC codes provided

  43. Novel High-Throughput Decoding Algorithms for Product and Staircase Codes based on Error-and-Erasure Decoding

    Authors: Alireza Sheikh, Alexandre Graell i Amat, Alex Alvarado

    Abstract: Product codes (PCs) and staircase codes (SCCs) are conventionally decoded based on bounded distance decoding (BDD) of the component codes and iterating between row and column decoders. The performance of iterative BDD (iBDD) can be improved using soft-aided (hybrid) algorithms. Among these, iBDD with combined reliability (iBDD-CR) has been recently proposed for PCs, yielding sizeable performance g… ▽ More

    Submitted 5 August, 2020; originally announced August 2020.

  44. arXiv:2007.10174  [pdf, ps, other

    cs.IT

    Multi-Server Weakly-Private Information Retrieval

    Authors: Hsuan-Yin Lin, Siddhartha Kumar, Eirik Rosnes, Alexandre Graell i Amat, Eitan Yaakobi

    Abstract: Private information retrieval (PIR) protocols ensure that a user can download a file from a database without revealing any information on the identity of the requested file to the servers storing the database. While existing protocols strictly impose that no information is leaked on the file's identity, this work initiates the study of the tradeoffs that can be achieved by relaxing the perfect pri… ▽ More

    Submitted 2 November, 2021; v1 submitted 17 July, 2020; originally announced July 2020.

    Comments: To appear in IEEE Transactions on Information Theory. arXiv admin note: text overlap with arXiv:1901.06730

  45. Refined Reliability Combining for Binary Message Passing Decoding of Product Codes

    Authors: Alireza Sheikh, Alexandre Graell i Amat, Gianluigi Liva, Alex Alvarado

    Abstract: We propose a novel soft-aided iterative decoding algorithm for product codes (PCs). The proposed algorithm, named iterative bounded distance decoding with combined reliability (iBDD-CR), enhances the conventional iterative bounded distance decoding (iBDD) of PCs by exploiting some level of soft information. In particular, iBDD-CR can be seen as a modification of iBDD where the hard decisions of th… ▽ More

    Submitted 29 May, 2020; originally announced June 2020.

  46. arXiv:2005.08593  [pdf, other

    cs.IT

    Private Edge Computing for Linear Inference Based on Secret Sharing

    Authors: Reent Schlegel, Siddhartha Kumar, Eirik Rosnes, Alexandre Graell i Amat

    Abstract: We consider an edge computing scenario where users want to perform a linear computation on local, private data and a network-wide, public matrix. Users offload computations to edge servers located at the edge of the network, but do not want the servers, or any other party with access to the wireless links, to gain any information about their data. We provide a scheme that guarantees information-th… ▽ More

    Submitted 19 October, 2020; v1 submitted 18 May, 2020; originally announced May 2020.

    Comments: 6 pages, 4 figures, to be published in the Proceedings of the 2020 IEEE Global Communications Conference (IEEE GLOBECOM), reviewers' comments are addressed, results remain unchanged

  47. Finite-Length Scaling of Spatially Coupled LDPC Codes Under Window Decoding Over the BEC

    Authors: Roman Sokolovskii, Alexandre Graell i Amat, Fredrik Brännström

    Abstract: We analyze the finite-length performance of spatially coupled low-density parity-check (SC-LDPC) codes under window decoding over the binary erasure channel. In particular, we propose a refinement of the scaling law by Olmos and Urbanke for the frame error rate (FER) of terminated SC-LDPC ensembles under full belief propagation (BP) decoding. The refined scaling law models the decoding process as… ▽ More

    Submitted 25 August, 2020; v1 submitted 9 March, 2020; originally announced March 2020.

    Comments: Published in IEEE Transactions on Communications (Early Access). This paper was presented in part at the IEEE Information Theory Workshop (ITW), Visby, Sweden, August 2019 (arXiv:1904.10410)

  48. arXiv:2002.08080  [pdf, ps, other

    cs.IT

    Dynamic Coded Caching in Wireless Networks

    Authors: Jesper Pedersen, Alexandre Graell i Amat, Jasper Goseling, Fredrik Brännström, Iryna Andriyanova, Eirik Rosnes

    Abstract: We consider distributed and dynamic caching of coded content at small base stations (SBSs) in an area served by a macro base station (MBS). Specifically, content is encoded using a maximum distance separable code and cached according to a time-to-live (TTL) cache eviction policy, which allows coded packets to be removed from the caches at periodic times. Mobile users requesting a particular conten… ▽ More

    Submitted 22 December, 2020; v1 submitted 19 February, 2020; originally announced February 2020.

    Comments: To appear in IEEE Transactions on Communications

  49. arXiv:2001.08727  [pdf, other

    cs.IT

    The Capacity of Single-Server Weakly-Private Information Retrieval

    Authors: Hsuan-Yin Lin, Siddhartha Kumar, Eirik Rosnes, Alexandre Graell i Amat, Eitan Yaakobi

    Abstract: A private information retrieval (PIR) protocol guarantees that a user can privately retrieve files stored in a database without revealing any information about the identity of the requested file. Existing information-theoretic PIR protocols ensure perfect privacy, i.e., zero information leakage to the servers storing the database, but at the cost of high download. In this work, we present weakly-p… ▽ More

    Submitted 30 January, 2021; v1 submitted 23 January, 2020; originally announced January 2020.

    Comments: To appear in IEEE Journal of Selected Areas in Information Theory (JSAIT), Special Issue on Privacy and Security of Information Systems, 2021

  50. arXiv:2001.07464  [pdf, other

    cs.IT cs.LG

    Pruning Neural Belief Propagation Decoders

    Authors: Andreas Buchberger, Christian Häger, Henry D. Pfister, Laurent Schmalen, Alexandre Graell i Amat

    Abstract: We consider near maximum-likelihood (ML) decoding of short linear block codes based on neural belief propagation (BP) decoding recently introduced by Nachmani et al.. While this method significantly outperforms conventional BP decoding, the underlying parity-check matrix may still limit the overall performance. In this paper, we introduce a method to tailor an overcomplete parity-check matrix to (… ▽ More

    Submitted 22 October, 2020; v1 submitted 21 January, 2020; originally announced January 2020.

    Comments: This work was presented at the IEEE International Symposium on Information Theory (ISIT) 2020